Wherever a sub-processor is engaged, the identical information defense obligations inside the deal amongst the controller and processor should be imposed over the sub-processor By means of deal or other “organisational measures.”[forty five] The processor will continue to be absolutely liable for the controller for performance on the sub-processor’s obligations. https://medium.com/@cybersecurityservice/data-privacy-compliance-in-saudi-arabia-ed1d6e9bc078